Abstract

Vehicle network application node security authentication based on trusted computing and direct anonymous attestation

Author(s): Ren Shuai, Zhao Xiangmo, Zhang Tao, Lou Zongzong

Security is a basic requirement for vehicle network or other networks. But there is little security strategy special for vehicle network. The existing network security strategy, which applies to fixed network very well, cannot satisfy the requirement of vehicle network. In this paper, trusted computing and direct anonymous attestation theories are adopted to establish protocol system of trusted vehicle information authentication, thus the security of authentication process for nodes in vehicle network can be improved. It is illustrated that the efficiency of verification can be increased and the possibility of being attacked can be decreased.


Share this       

Share this Page

Table of Contents

Scimago Journal Rank

SCImago Journal & Country Rank

Flyer